PrepAway - Latest Free Exam Questions & Answers

Author: seenagape

Which of the following would be the best choice to implement to meet the above requirements?

A company recently experienced several security breaches that resulted in confidential data being
infiltrated form the network. The forensic investigation revealed that the data breaches were
caused by an insider accessing files that resided in shared folders who then encrypted the data
and sent it to contacts via third party email. Management is concerned that other employees may
also be sending confidential files outside of the company to the same organization. Management
has requested that the IT department implement a solution that will allow them to:
Track access and sue of files marked confidential, provide documentation that can be sued for
investigations, prevent employees from sending confidential data via secure third party email,
identify other employees that may be involved in these activities.
Which of the following would be the best choice to implement to meet the above requirements?

Which of the following is the best option for meeting this goal?

A company has several public conference room areas with exposed network outlets. In the past,
unauthorized visitors and vendors have used the outlets for internet access. The help desk
manager does not want the outlets to be disabled due to the number of training sessions in the
conference room and the amount of time it takes to get the ports either patched in or enabled.
Which of the following is the best option for meeting this goal?

which of the following security concepts will most effectively address the finding?

While preparing for an audit a security analyst is reviewing the various controls in place to secure
the operation of financial processes within the organization. Based on the pre assessment report,
the department does not effectively maintain a strong financial transaction control environment
due to conflicting responsibilities held by key personnel. If implemented, which of the following
security concepts will most effectively address the finding?